CVE-2026-24352

PluXml · PluXml CMS

PluXml CMS is vulnerable to session fixation, allowing unauthenticated attackers to pre-set a victim's session ID and hijack the session after the victim logs in.

Executive summary

A session fixation vulnerability in PluXml CMS allows unauthenticated attackers to hijack user sessions, leading to unauthorized access to the CMS administrative or user panels.

Vulnerability

The application fails to regenerate the session identifier upon successful authentication. This allows an unauthenticated attacker to fix a session ID for a victim (e.g., via a malicious link) and then use that same ID to take over the account once the victim authenticates.

Business impact

Session hijacking can lead to total account compromise, including administrative accounts. With a CVSS score of 9.8, the impact is critical, as it allows attackers to modify website content, steal user data, or use the CMS as a pivot point for further attacks.

Remediation

Immediate Action: Update PluXml to the latest available version provided by the vendor. If no patch is available, consider migrating to a supported CMS.

Proactive Monitoring: Monitor for suspicious session activity, such as multiple IP addresses associated with a single session ID or unusual administrative logins.

Compensating Controls: Configure the web server to use HttpOnly and Secure flags for cookies and implement short session timeouts to minimize the window of opportunity for hijackers.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Security teams should treat this as a high-priority item. The lack of session regeneration is a fundamental security flaw; administrators should verify if their current version is affected and apply vendor updates immediately.